CIO Influence

Category : Guest Authors

Apps Data Management Guest Authors Machine Learning Security

How to Secure LCNC’s External Attack Surface

Amichai Shulman
Organizations are embracing low-code/no-code (LCNC) platforms and robotic process automations (RPAs) at an unprecedented pace, often underestimating the security risks they introduce. These platforms promise...
Guest Authors Security Technology

Maximizing Value: Optimizing Cybersecurity with Existing Systems

Nate Galimore
As cybersecurity continues to evolve, one trend is becoming clear: organizations are now placing greater emphasis on maturing their existing authentication capabilities. The question is...
Analytics Guest Authors IT services Machine Learning Security

The Hidden Threat in Your Software Supply Chain

Daren Goesen
Not that you were ignoring cybersecurity before, but lately it has been impossible to ignore, with the world waking up to what’s really at stake...
Guest Authors IT services Machine Learning Regulation and Compliance Managment Security

As GenAI Democratizes Bots, Cybersecurity Must Evolve to Understand Their Intent

Guy Tytunovich
Coming out of Dreamforce 2024, the spotlight was on AI-powered Agents and their wide-ranging uses by both consumers and businesses. These AI agents have wide-reaching...
Cloud Guest Authors Machine Learning

How Enterprises Can Leverage the CX Software Upgrade Cycle Through 2025

Marylou Maco
The communications software landscape is undergoing a massive upgrade cycle, transforming how businesses deliver both customer and employee experiences (CX and EX). With a significant...
Analytics Cloud Computing Data Management Digital Transformation Guest Authors Machine Learning Security

AI-Driven Network Intelligence: Transforming Enterprise Connectivity Management

Jamie Pugh
The landscape of enterprise networks is undergoing a rapid transformation, driven by the increasing adoption of Artificial Intelligence (AI) and machine learning (ML) technologies. As...